At-a-Glance Cisco Identity Services Engine with Integrated Security Information and Event Management and Threat Defense Platforms Benefits • Decrease time to event classification by using Cisco® Identity Services Engine (ISE) contextual information to expedite the classification of security events. • Improve SIEM analytic policies by differentiating users, groups, and devices using the engine’s contextual information to create analytic policies specific to users, groups, or devices. • Decrease security risk from devices with security posture failures by using Cisco ISE endpoint posture information to create analytic policies specific to endpoints that have a noncompliant posture status. • Improve visibility and analysis of Cisco ISE telemetry and event data by analyzing and providing alerts based on anomalies in Cisco ISE event data, such as excessive authentication attempts. Gain Visibility into Network Threats and Remediate Cisco® Identity Services Engine (ISE) integrates with leading security event and information management (SIEM) and threat defense (TD) platforms to bring together a networkwide view of security event analysis and relevant identity and device context. Cisco ISE uses Cisco Platform Exchange Grid (pxGrid) technology to share contextual data with leading SIEM and TD partner solutions. The combination of these integrated technologies gives security analysts the ability to quickly and easily assess the significance of security events by correlating expanded context with the security alerts. Cisco ISE, using pxGrid technology, enables the SIEM and TD system management consoles to display contextual information pulled from the engine about each security event. The data can include the identity and level of access of each user and the type of device used. This information permits the analyst to more quickly determine where the event is coming from, whether it needs further investigation, and, if so, how urgent is the threat. Cisco ISE can then be used to take mitigation actions. Identity Services Engine integrations with SIEM and TD platforms also allow for enhanced security monitoring, including mobility-aware security analytics. The enhanced capabilities from The enhanced capabilities from Cisco ISE with SIEM and TD integration streamline the process of threat detection, simplify execution of responses by IT, and greatly reduce the time to remediation of network security threats. © 2015 Cisco and/or its affiliates. All rights reserved. nce At-a-Glance Next Steps To learn more about the Cisco Identity Services Engine, visit http://www.cisco. com/go/ISE. For additional information regarding Identity Services Engine SIEM/TD partners, visit http://www.cisco.com/c/ en/us/products/security/partnerecosystem.html. How Cisco Identity Services Engine Integrations with SIEM and TD Solutions Works The Identity Services Engine provides its user identity and device contextual information to SIEM and TD partner platforms. Then: • Cisco ISE contextual data is used to create new security analysis classes for high-risk user populations or devices, such as policies specific to mobile devices or users with access to highly sensitive information. • Cisco ISE contextual data is also appended to associated events in the SIEM and TD partner solutions to provide the additional context of the user, device, and access level. The information helps analysts better decipher the significance of a security event. • Users of SIEM TD partner products can then use the Identity Services Engine as a conduit for taking mitigation actions within the Cisco network infrastructure. The engine can undertake a quarantine or access-block action on users and devices based on policies defined by the engine for such actions. • All of these functions can be logged and reported on within the SIEM and TD products, providing unified, networkwide security reporting. Some of the main attributes of the Identity Services Engine available for use SEIM and TD for user- and device-related context are: • User: User name, IP address, authentication status, location • User class: Authorization group, guest, quarantined • Device: Manufacturer, model, OS, OS version, MAC address, IP address, network connection method (wired or wireless), location • Posture: Posture compliance status, antivirus installed, antivirus version, OS patch level, mobile device posture compliance status through mobile device management (MDM) ecosystem partners © 2015 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/ go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) C45-732858-01 05/15